Browse > Article
http://dx.doi.org/10.3837/tiis.2022.08.017

A Study on Finding Emergency Conditions for Automatic Authentication Applying Big Data Processing and AI Mechanism on Medical Information Platform  

Ham, Gyu-Sung (Department of Computer Engineering, Wonkwang University)
Kang, Mingoo (Department of IT Contents, Hanshin University)
Joo, Su-Chong (Department of Computer.Software Engineering, Wonkwang University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.8, 2022 , pp. 2772-2786 More about this Journal
Abstract
We had researched an automatic authentication-supported medical information platform[6]. The proposed automatic authentication consists of user authentication and mobile terminal authentication, and the authentications are performed simultaneously in patients' emergency conditions. In this paper, we studied on finding emergency conditions for the automatic authentication by applying big data processing and AI mechanism on the extended medical information platform with an added edge computing system. We used big data processing, SVM, and 1-Dimension CNN of AI mechanism to find emergency conditions as authentication means considering patients' underlying diseases such as hypertension, diabetes mellitus, and arrhythmia. To quickly determine a patient's emergency conditions, we placed edge computing at the end of the platform. The medical information server derives patients' emergency conditions decision values using big data processing and AI mechanism and transmits the values to an edge node. If the edge node determines the patient emergency conditions, the edge node notifies the emergency conditions to the medical information server. The medical server transmits an emergency message to the patient's charge medical staff. The medical staff performs the automatic authentication using a mobile terminal. After the automatic authentication is completed, the medical staff can access the patient's upper medical information that was not seen in the normal condition.
Keywords
AI Mechanism & Big Data Processing; Automatic Authentication; Edge Computing; Emergency Conditions; Medical Information Platform;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 Hybus, [Online]. Available: http://hybus.net/ko/sub/product/view.asp?p_idx=68&s_cate=1217
2 Harimoorthy, K., Thangavelu, M., "Multi-disease prediction model using improved SVM-radial bias technique in healthcare monitoring system," J Ambient Intell Human Comput, vol. 12, pp. 3715-3723, 2021.   DOI
3 Milne, G.R., Pettinico, G., Hajjat, F.M. and Markos, E., "Information Sensitivity Typology: Mapping the Degree and Type of Risk Consumers Perceive in Personal Data Sharing," J Consum Aff, vol. 51, no. 1, pp. 133-161. 2017.   DOI
4 AAMI, "Testing and reporting performance results of cardiac rhythm and ST segment measurement algorithms," ANSIAAMI EC38, Tech. Rep., 1998.
5 J. Y. Cho, D. Ko and B. G. Lee, "Strategic Approach to Privacy Calculus of Wearable Device User Regarding Information Disclosure and Continuance Intention," KSII Transactions on Internet and Information Systems, vol. 12, no. 7, pp. 3356-3374, Jul. 2018.   DOI
6 G.-S. Ham and S.-C. Joo, "Development of Authentication Service Model Based ContextAwareness for Accessing Patient's Medical Information," Journal of Internet Computing and Services, vol. 22, no. 1, pp. 99-107, Feb. 2021.   DOI
7 Y. Kim and Y. J. Choi, "Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment," Journal of Information and Security, vol. 19, no. 3, pp. 29-36, 2019.
8 Lee, C. H., & Yoon, H. J., "Medical big data: promise and challenges," Kidney research and clinical practice, vol. 36, no. 1, pp. 3-11. Mar. 2017.   DOI
9 M. A. Khan, M. T. Quasim, N. S. Alghamdi and M. Y. Khan, "A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data," IEEE Access, vol. 8, pp. 52018-52027, 2020.   DOI
10 Kim Jeom Goo, "Implementation of Role-based Multi-authentication System for Secure Smart Home," the journal of Korean institute of next generation computing, vol. 17, no. 4, pp. 59-68, 2021.   DOI
11 Ren, X., Zhai, Y., Song, X., Wang, Z., Dou, D., & Li, Y., "The application of mobile telehealth system to facilitate patient information presentation and case discussion," Telemedicine and eHealth, vol. 26, no. 6, pp. 725-733, 2020.   DOI
12 Park M, Oh H, Lee K, "Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Conditional Awareness Perspective," Sensors, vol. 19, no. 9, May. 2019.
13 X. Liu, Y. Zhu, Y. Ge, D. Wu and B. Zou, "A Secure Medical Information Management System for Wireless Body Area Networks," KSII Transactions on Internet and Information Systems, vol. 10, no. 1, pp. 221-237, Jan. 2016.   DOI
14 P. Pace, G. Aloi, R. Gravina, G. Caliciuri, G. Fortino and A. Liotta, "An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0," IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 481-489, Jan. 2019.   DOI
15 Min Chen, Wei Li, Yixue Hao, Yongfeng Qian and Iztok Humar, "Edge cognitive computing based smart healthcare system," Future Generation Computer Systems, vol. 86, pp. 403-411, Sep. 2018.   DOI
16 M. A. Rahman, M. S. Hossain, N. A. Alrajeh and N. Guizani, "B5G and Explainable Deep Learning Assisted Healthcare Vertical at the Edge: COVID-I9 Perspective," IEEE Network, vol. 34, no. 4, pp. 98-105, Jul. 2020.   DOI
17 J. Kim and K. Chung, "Prediction Model of User Physical Activity using Data Characteristicsbased Long Short-term Memory Recurrent Neural Networks," KSII Transactions on Internet and Information Systems, vol. 13, no. 4, pp. 2060-2077, Apr. 2019.   DOI
18 Yi Yu, Jingsha He, Nafei Zhu, Fangbo Cai, Muhammad Salman Pathan, "A new method for identity authentication using mobile terminals," Procedia Computer Science, vol. 131, pp. 771-778, 2018. .   DOI
19 J.-Y. Hong and H.-H. Kim, "A Study on Awareness Levels of Personal Information Protection in Health Care Workers," Journal of the Korea Entertainment Industry Association, vol. 13, no. 8, pp. 647-659, Dec. 2019.   DOI
20 El-hajj, Mohammed, Ahmad Fadlallah, Maroun Chamoun, and Ahmed Serhrouchni, "A Survey of Internet of Things (IoT)- Authentication Schemes," Sensors, vol. 19, no. 5, p. 1141, 2019.
21 IBM, "Cost of a Data Breach Report 2021," 2021. [Online]. Available: https://www.ibm.com/security/data-breach
22 Su-Chong Joo, "Automatic Authentication Method based on Dynamic Context for Transparent Access for Medical Information," South Korea Patent 10-2026018, Sep. 2019.
23 Kai Hwang, Min Chen, Big-data analytics for cloud, IoT and cognitive computing, Hoboken, New Jersey: Wiley, Apr. 2018.
24 Darshan K R and Anandakumar K R, "A comprehensive review on usage of Internet of Things (IoT) in healthcare system," in Proc. of 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), pp. 132-136, 2015.
25 Ahmed Ismail, Samir Abdlerazek and I. M. El-henawy, "Big Data Analytics in Heart Diseases Prediction," Journal of Theoretical and Applied Information Technology, vol. 98, no. 11, pp. 1970-1980, Jun. 2020.
26 Nishita Mehta, Anil Pandit, "Concurrence of big data analytics and healthcare: A systematic review," International Journal of Medical Informatics, vol. 114, pp. 57-65, Jun. 2018.   DOI
27 Lorkowski J., Grzegorowska O., Pokorski M., "Artificial Intelligence in the Healthcare System: An Overview," in Best Practice in Health Care, Pokorski M. eds., vol. 1335, Ed. Poland, Springer, 2021, pp. 1-10
28 F. J. P. Montalbo, "A Computer-Aided Diagnosis of Brain Tumors Using a Fine-Tuned YOLO-based Model with Transfer Learning," KSII Transactions on Internet and Information Systems, vol. 14, no. 12, pp. 4816-4834, Dec. 2020.
29 A. Rasheed, P. H. J. Chong, I. W. Ho, X. J. Li and W. Liu, "An Overview of Mobile Edge Computing: Architecture, Technology and Direction," KSII Transactions on Internet and Information Systems, vol. 13, no. 10, pp. 4849-4864, Oct. 2019.   DOI
30 "Blood Pressure and Blood Sugar Data," National Health Insurance Sharing Service(NHISS) Korea. [Online]. Available: https://nhiss.nhis.or.kr/bd/ab/bdabf003cv.do
31 Habib, Carol, et al., "Health risk assessment and decision-making for patient monitoring and decision-support using wireless body sensor networks," Information fusion, vol. 47, pp. 10-22, May. 2019.   DOI
32 Moody GB, Mark RG, "The impact of the MIT-BIH Arrhythmia Database," IEEE Eng in Med and Biol, vol. 20, no. 3, pp. 45-50, Jun. 2001.   DOI
33 Singh, S.P., Nayyar, A., Kumar, R. et al. "Fog computing: from architecture to edge computing and big data processing," J Supercomput, vol. 75, pp. 2070-2105, Apr. 2019.   DOI
34 Wellysis, [Online]. Available: https://www.wellysis.com/
35 S.-C. Bae, Y.-S. Lee, and S.-W. Choi, "Vision-based Authentication and Registration of Facial Identity in Hospital Information System," Journal of the Korea Society of Computer and Information, vol. 24, no. 12, pp. 59-65, 2019.   DOI
36 Edward Min, "The Application of Deep Convolutional Networks for the Classification of ECG Signal," GitHub, 2019. [Online]. Available: https://github.com/eddymina/ECG_Classification_Pytorch
37 D. Eom, H. Lee, and H. Zoo, "Medical Information Privacy Concerns in the Use of the EHR System: A Grounded Theory Approach," Journal of Digital Convergence, vol. 16, no. 1, pp. 217-229, Jan. 2018.   DOI
38 Jayabalan, Manoj, and Thomas O'Daniel, "A study on authentication factors in electronic health records," Journal of Applied Technology and Innovation, vol. 3, no. 1, pp. 7-14, 2019.